← All posts

Security Research

10 articles

13 min read

Audit Trails for AI Agents: Logging What Your Agent Does

If you cannot prove what your AI agent did, you cannot trust it — and neither can your auditors. Learn what to log, how to build an audit pipeline, compliance requirements for agent logging, and dashboard patterns for monitoring agent tool usage.

Mar 23, 2026
14 min read

Sandboxing AI Agent Tools: Isolation Strategies

AI agent tools execute third-party code in your environment. Without sandboxing, a single malicious tool can compromise your entire infrastructure. Learn container isolation, network restrictions, filesystem sandboxing, and production deployment strategies.

Mar 23, 2026
18 min read

AI Agent Permission Models: Principle of Least Privilege

Most AI agents run with far more permissions than they need. Learn the four permission dimensions for agent tools, how to enforce least privilege, and why the industry's current approach to agent permissions is dangerously broken.

Mar 23, 2026
11 min read

SOC2 Compliance for AI Agent Tools: Audit Guide

Learn how AI agent tools affect SOC2 compliance. Covers audit requirements, data handling concerns, verification as a control, permission models, logging, monitoring, and how to build an audit-ready agent tool pipeline.

Mar 23, 2026
14 min read

Enterprise AI Agent Security: A CISO's Guide

A comprehensive guide for CISOs deploying AI agents in enterprise environments. Covers threat modeling, network boundaries, data classification, vendor risk assessment, and policy templates for secure agent tool adoption.

Mar 23, 2026
11 min read

AI Agent Supply Chain Security: Lessons from npm and PyPI

Supply chain attacks devastated npm and PyPI. AI agents face even greater risks because they install and execute tools autonomously. Learn from software history and discover how verification-first registries prevent the next generation of supply chain attacks.

Mar 23, 2026
12 min read

Agent Tool Verification: Why "Works on My Machine" Is Not Enough

In traditional software, "it compiles" is not enough to ship. So why are we installing AI agent tools with zero verification? A deep dive into why agent tool verification matters and how automated pipelines catch what manual testing misses.

Mar 23, 2026
15 min read

AI Agent Security in 2026: Threats, Vulnerabilities, and How to Protect Your Stack

In 2025, AI agents started installing their own tools. In 2026, attackers noticed. This comprehensive guide covers the real threat landscape — supply chain attacks, prompt injection, tool poisoning, and the defenses that actually work.

Mar 23, 2026
15 min read

MCP Server Security: 82% Have Path Traversal Vulnerabilities

30 CVEs in MCP's first year. 82% of servers vulnerable to path traversal. And Smithery just leaked thousands of API keys. Here's the full picture.

Mar 23, 2026
14 min read

ClawHavoc Explained: 341 Malicious AI Agent Skills and What It Means for You

341 malicious AI agent skills. macOS malware. Credential stealers. Reverse shells. This is what happened when an agent tool registry had zero verification.

Mar 23, 2026